Know Before You Go: Rideshare Safety

Know Before You Go: Rideshare Safety

There are several things riders can and should do before and during a ride to take charge of their own security and make sure that the vehicle is one they have booked.

Rideshare platforms have been flooding the recent news cycle following the murder of a South Carolina student by a man posing as a rideshare driver. Having become an important part of our national transportation system and because so many individuals and businesses depend on them daily, rideshare apps have security measures in place to help provide safe experiences for users. However, there are several things riders can and should do before and during a ride to take charge of their own security and make sure that the vehicle is one they have booked.

Before entering the car, travelers should refer to the rideshare app for the model, color and license plate of the vehicle coming to pick them up. Riders can use this information to confirm their vehicle before getting in and should always do so in the following sequence:

1. Look for the make of the car as the vehicle approaches: Travelers can usually identify the make by the emblem on the hood or the words on the back of the vehicle.

 

2. Confirm the model of the vehicle: The model of a vehicle can usually be found on the trunk. If provided by the app, ridesharers should also use this time to confirm the color of the car.

 

3. Confirm the license plate number: Many rideshare vehicles look the same, so it’s important to use the license plate number as final confirmation that it’s the correct car before approaching the vehicle. License plate numbers are unique to each vehicle, so if the number in your app differs from the number on the car, do not approach the vehicle. If the number matches, move on to the next step.

 

4. Indicate for the driver to lower the window or open the back door without entering the vehicle: Before entering the vehicle, travelers should always ask the driver to tell them who he/she is there to pick up. Rideshare platforms provide all drivers with the rider’s name so there is no reason for a rider to enter a vehicle without confirming the driver has the correct name. During this step, ride sharers must remember not to share their name first. If the rider does not hear their name or doesn’t understand the driver, they can ask for the driver to show them the app. If this is the case, travelers should look for the pickup name on the app. Even if the license plate number matches the app, do not get into the car until confirming the driver is there to pick you up.

 

After getting in the car, riders should remain vigilant. Rideshare apps offer a couple of ways to enhance safety and security while on the ride, including:

● An option to share your destination with a trusted contact: Rideshare apps offer the ability to share the route and destination of a trip, including anticipated arrival time, with any contacts. If on a personal trip, riders may want to share their trip with a friend or relative. If on a work trip, riders can share trips with colleagues or supervisors. As an additional safety measure, travelers can follow-up with whoever they shared their ride with via text, asking them to call you if late.

● An emergency feature within the app: Most rideshare apps have a safety button that connects riders directly to the company safety and security team. Riders can use this button if they feel insecure at any point during their experience. Situations such as erratic driving, an abusive driver or deviating from the recommended route are all reasons to contact the safety team. After contacted, safety teams are able to track the vehicle, communicate with the driver and contact local authorities, if necessary.

 

Although we should always be cognizant of our surroundings, it’s important to remember that rideshare companies provide safe, reliable and efficient transportation for millions of people every day. The tragedy in South Carolina reminds us that there are predators out there who mean harm and because of this, we must look out for each other and ourselves. Applying these simple steps to everyday travel could help riders prevent future tragedies.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3